www.ijcrt.org © 2018 IJCRT | Volume 6, Issue 2 April 2018 | ISSN: 2320-2882
IJCRT1892208 International Journal of Creative Research Thoughts (IJCRT) www.ijcrt.org 1368
Analysis of Network Layer Attacks on Secure
Routing Protocol in MANET
Rashmi Jatain
B.Tech, M.Tech , CSE
Abstract— An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary
network without the use of any existing network infrastructure or centralized administration. Due to the
nature of ad hoc networks, secure routing is an important area of research in developing secured routing
protocols. Although researchers have proposed several secure routing protocols, their resistance towards
various types of attacks and efficiency are primary points of concern in implementing these protocols. Some
of the available secure routing protocols and most common network layer attacks against mobile ad hoc
networks are evaluated. Secure routing protocols are analysed against the most commonly identified
network layer attacks such as: denial-ofservice attack, tunneling, spoofing, blackhole attack and wormhole
attack and their comparative analysis is also done
Keywords— MANET, Secure Routing Protocols, Network Layer Attacks and Analysis.
Introduction- The latest advancement in wireless technology and its applications received a lot of attention.
An ad hoc network is one such recent technology, which gives a new paradigm for wireless self-organised
networks. Ad hoc networks are simple peer-to peer networks, self-organised and with no fixed
infrastructure. Ad-hoc network is a concept in computer communication which means that user wants to
communicate with each other to form a temporary network, without use of centralized administration. Each
node in the network acts both as host and router and must therefore willing to forward packet for other
node.[1] A Mobile Adhoc Network (MANET) is a temporary wireless network composed of mobile nodes
without any permanent infrastructure. Each node not only operates as an end system, it also acts as a router
to forward packets on behalf of other nodes [1]. One of the best features of MANET is its flexibility and can
configure itself in the fly and thus very suitable for the emergency situation. Most common issues related to
nodes in MANETs are limited resources such as battery backup, limited range etc., dynamic topology i.e
number of nodes keeps on changing on the fly and address assignment as allocating address to different
nodes successfully. Wireless channels are also facing some issues such as Relatively High Error Rate, High
variability in the quality, Low bandwidth, Broadcast Nature and Security Aspects [2]. MANETs are
extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional
security infrastructures and open medium of communication, which, unlike their wired counterparts, cannot
be secured [3][4]. To address these concerns, several secure routing protocols have been developed: Secure
Efficient Distance Vector Routing (SEAD), Ariadne, Authenticated Routing for Ad hoc Networks (ARAN),
Secure Ad hoc On-Demand Distance Vector Routing (SAODV), Secure Routing Protocol (SRP), Security-
Aware Routing Protocol (SAR) [5][6][7]. The goal of this paper is analyse secure routing protocols in
MANET against network layer attack patterns in ad hoc environment based on the literature study[8][9][10]
. From literature is concluded that none of secure routing protocol is secure enough against various attacks.
The secure-protocol development has become the most challenging task in securing ad hoc networks. Most
of these existing protocols have been developed based on specific security scenarios. So the main purpose of
this research is to understand more deeply and analyse MANETs secure routing protocols with network
layer attacks [11][12][13. This section contains basic about MANETs, related issues, section 2 contains
details about various network layer attacks, section 3 has discussed secure routing protocols, section 4
contains analysis of secure routing protocols with network layer attacks, and section 5 contains comparative
analysis of secure routing layer protocols followed by conclusion and references.